A vulnerability in the REST API of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability exists because different installations share a static encryption key. An attacker could exploit this vulnerability by using the static key to craft a valid session token. A successful exploit could allow the attacker to perform arbitrary actions through the REST API with administrative privileges.
History

Wed, 13 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2020-07-31T00:00:40.851878Z

Updated: 2024-11-13T18:17:42.880Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3382

cve-icon Vulnrichment

Updated: 2024-08-04T07:30:58.193Z

cve-icon NVD

Status : Modified

Published: 2020-07-31T00:15:13.147

Modified: 2024-11-21T05:30:55.257

Link: CVE-2020-3382

cve-icon Redhat

No data.